[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with MariaDB 10.4.7 through 10.4.11 and is prone to an improper privilege management vulnerability. A flaw is present in the application which fails to properly handle auth_pam_tool_dir/auth_pam_tool component. Successful exploitation allows privilege escalation from the mysql user account to root because chown and chmod are performed unsafely.

The host is installed with IBM DB2 9.1 before FP9 or 9.5 before FP6 or 9.7 before FP2 and is prone to Privilege escalation vulnerability. A flaw is present in the DB2DART tool in the application which fails to avoid unspecified error in the DB2DART tool. Successful exploitation allows an attacker could overwrite arbitrary files owned by the DB2 instance owner.

The host is installed with Opera before 11.01 and is prone to Clickjacking vulnerability. A flaw is present in Opera which does not properly restrict the use of opera: URLs. Successful exploitation allows remote attackers to conduct clickjacking attacks via a crafted web site.

The host is installed with IBM DB2 9.1 before FP9 or 9.5 before FP6 or 9.7 before FP2 and is prone to Unspecified vulnerability. A flaw is present in the DB2STST program in the application which fails to avoid unspecified error within DB2STST. Successful exploitation allow attackers to have unknown impact and attack vectors.

The host is installed with IBM DB2 9.1 before FP9 and is prone to Denial of service vulnerability. A flaw is present in the REPEAT function in the application which fails to avoid buffer overflow error. Successful exploitation allow remote authenticated attacker could exploit this vulnerability to overflow a buffer and cause the server to crash.

The host is installed with IBM DB2 9.1 before FP9 or 9.5 before FP6a or 9.7 before FP2 and is prone to Heap-based buffer overflow vulnerability. A flaw is present in the application which does not properly handle bounds check. Successful exploitation allow remote attacker could overflow a buffer and execute arbitrary code on the system with elevated privileges or cause the database server to crash ...

The host is installed with IBM DB2 UDB 9.5 before FP6a and is prone to security vulnerability. A flaw is present in install component in IBM DB2 which enforces an unintended limit on password length. Successful exploitation allow remote attackers to obtain access via a brute-force attack.

The host is installed with IBM DB2 UDB 9.5 before FP6a and is prone to denial of service vulnerability. A flaw is present in administration server component in IBM DB2 which fails to properly handle buffer allocation. Successful exploitation allow remote attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors.

The host is installed with IBM DB2 UDB 9.5 before FP6a and is prone to denial of service vulnerability. A flaw is present in DRDA Services component in IBM DB2 which fails to properly handle client CLI in executing a prepared statement with a large number of parameter markers. Successful exploitation allow remote authenticated users to cause a denial of service (database server ABEND).

The host is installed with IBM DB2 UDB 9.5 before FP6a and is prone to security vulnerability. A flaw is present in engine utilities component in IBM DB2 which fails to properly handle world-writable permissions for the sqllib/cfg/db2sprf file. Successful exploitation allow local users to gain privileges by modifying this file.


Pages:      Start    1245    1246    1247    1248    1249    1250    1251    1252    1253    1254    1255    1256    1257    1258    ..   1516

© SecPod Technologies